Lucene search

K
cve[email protected]CVE-2023-35871
HistoryJul 11, 2023 - 3:15 a.m.

CVE-2023-35871

2023-07-1103:15:09
CWE-787
web.nvd.nist.gov
29
sap
web dispatcher
version
vulnerability
memory corruption
information disclosure
system crashes
nvd
cve-2023-35871

9.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H

8.9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

32.6%

The SAP Web Dispatcher - versions WEBDISP 7.53, WEBDISP 7.54, WEBDISP 7.77, WEBDISP 7.85, WEBDISP 7.89, WEBDISP 7.91, WEBDISP 7.92, WEBDISP 7.93, KERNEL 7.53, KERNEL 7.54 KERNEL 7.77, KERNEL 7.85, KERNEL 7.89, KERNEL 7.91, KERNEL 7.92, KERNEL 7.93, KRNL64UC 7.53, HDB 2.00, XS_ADVANCED_RUNTIME 1.00, SAP_EXTENDED_APP_SERVICES 1, has a vulnerability that can be exploited by an unauthenticated attacker to cause memory corruption through logical errors in memory management this may leads to information disclosure or system crashes, which can have low impact on confidentiality and high impact on the integrity and availability of the system.

Affected configurations

NVD
Node
sapweb_dispatcherMatch7.53
OR
sapweb_dispatcherMatch7.54
OR
sapweb_dispatcherMatch7.77
OR
sapweb_dispatcherMatch7.85
OR
sapweb_dispatcherMatch7.89
OR
sapweb_dispatcherMatch7.91
OR
sapweb_dispatcherMatch7.92
OR
sapweb_dispatcherMatch7.93
OR
sapweb_dispatcherMatchhdb_2.00
OR
sapweb_dispatcherMatchkernel_7.53
OR
sapweb_dispatcherMatchkernel_7.54
OR
sapweb_dispatcherMatchkernel_7.77
OR
sapweb_dispatcherMatchkernel_7.85
OR
sapweb_dispatcherMatchkernel_7.89
OR
sapweb_dispatcherMatchkernel_7.91
OR
sapweb_dispatcherMatchkernel_7.92
OR
sapweb_dispatcherMatchkernel_7.93
OR
sapweb_dispatcherMatchkrnl64uc_7.53
OR
sapweb_dispatcherMatchsap_extended_app_services_1
OR
sapweb_dispatcherMatchxs_advanced_runtime_1.00

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "SAP Web Dispatcher",
    "vendor": "SAP_SE",
    "versions": [
      {
        "status": "affected",
        "version": "WEBDISP 7.53"
      },
      {
        "status": "affected",
        "version": "WEBDISP 7.54"
      },
      {
        "status": "affected",
        "version": "WEBDISP 7.77"
      },
      {
        "status": "affected",
        "version": "WEBDISP 7.85"
      },
      {
        "status": "affected",
        "version": "WEBDISP 7.89"
      },
      {
        "status": "affected",
        "version": "WEBDISP 7.91"
      },
      {
        "status": "affected",
        "version": "WEBDISP 7.92"
      },
      {
        "status": "affected",
        "version": "WEBDISP 7.93"
      },
      {
        "status": "affected",
        "version": "KERNEL 7.53"
      },
      {
        "status": "affected",
        "version": "KERNEL 7.54 KERNEL 7.77"
      },
      {
        "status": "affected",
        "version": "KERNEL 7.85"
      },
      {
        "status": "affected",
        "version": "KERNEL 7.89"
      },
      {
        "status": "affected",
        "version": "KERNEL 7.91"
      },
      {
        "status": "affected",
        "version": "KERNEL 7.92"
      },
      {
        "status": "affected",
        "version": "KERNEL 7.93"
      },
      {
        "status": "affected",
        "version": "KRNL64UC 7.53"
      },
      {
        "status": "affected",
        "version": "HDB 2.00"
      },
      {
        "status": "affected",
        "version": "XS_ADVANCED_RUNTIME 1.00"
      },
      {
        "status": "affected",
        "version": "SAP_EXTENDED_APP_SERVICES 1"
      }
    ]
  }
]

9.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H

8.9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

32.6%

Related for CVE-2023-35871